already exists as an alternate
of this question.

exists and is an alternate of .

Asymmetric multiprocessing - In asymmetric multiprocessing (ASMP), the operating system typically sets aside one or more processors for its exclusive use. The remainder of the processors run user applications. As a result, the single processor running the operating system can fall behind the processors running user applications. This forces the applications to wait while the operating system catches up, which reduces the overall throughput of the system. In the ASMP model, if the processor that fails is an operating system processor, the whole computer can go down.Symmetric mMultiprocessing - Symmetric multiprocessing (SMP) technology is used to get higher levels of performance. In symmetric multiprocessing, any processor can run any type of thread. The processors communicate with each other through shared memory.SMP systems provide better load-balancing and fault tolerance. Because the operating system threads can run on any processor, the chance of hitting a CPU bottleneck is greatly reduced. All processors are allowed to run a mixture of application and operating system code. A processor failure in the SMP model only reduces the computing capacity of the system.SMP systems are inherently more complex than ASMP systems. A tremendous amount of coordination must take place within the operating system to keep everything synchronized. For this reason, SMP systems are usually designed and written from the ground up.

SIMD Defined The SIMD architecture performs an identical action simultaneously on multiple data pieces. This single action ca…n include retrieving, calculating or storing information. An example is retrieving a lot of different files at the same time. Processors with local memory containing different data execute the same instruction in a synchronized fashion, with inter-processor communication for shift allocation. MIMD Defined The MIMD architecture performs multiple different actions simultaneously on multiple data pieces. An example is the performance of various mathematical calculations such as addition and multiplication simultaneously in order to solve a complex math problem with many separate components. MIMD computing may or may not be synchronized and is increasing more commonly than SIMD computing.

1 person
found this useful

Doc Thermo

20,611 Contributions

Truth is knowledge of things as they really are, as they really were and as they really will be.

Symmetric encryption requires a single key known only to the authorized parties. Asymmetric encryption uses a pair of keys, one key available publicly (the "public key" and on…e key k(the "private key" or "secret key" own only to the person the public key belongs to. Symmetric encryption uses the same key to both encrypt and decrypt. Asymmetric encryption uses one key to encrypt and a different one to decrypt. If the owner is encrypting, they use the private key to encrypt and the recipient uses the corresponding public key to decrypt the message. If the owner is the recipient, the sender uses the public key to encrypt and the owner/recipeint uses their private key to decrypt.

Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the se…cret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised. The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric. If you do a quick search on the differences between symmetric and asymmetric you can find many more explanations. This just a quick overview.

Asymmetric multiprocessing - In asymmetric multiprocessing (ASMP), the operating system typically sets aside one or more processors for its exclusive use. The rema…inder of the processors run user applications. As a result, the single processor running the operating system can fall behind the processors running user applications. This forces the applications to wait while the operating system catches up, which reduces the overall throughput of the system. In the ASMP model, if the processor that fails is an operating system processor, the whole computer can go down. Symmetric mMultiprocessing - Symmetric multiprocessing (SMP) technology is used to get higher levels of performance. In symmetric multiprocessing, any processor can run any type of thread. The processors communicate with each other through shared memory. SMP systems provide better load-balancing and fault tolerance. Because the operating system threads can run on any processor, the chance of hitting a CPU bottleneck is greatly reduced. All processors are allowed to run a mixture of application and operating system code. A processor failure in the SMP model only reduces the computing capacity of the system. SMP systems are inherently more complex than ASMP systems. A tremendous amount of coordination must take place within the operating system to keep everything synchronized. For this reason, SMP systems are usually designed and written from the ground up

A symmetric multiprocessing (SMP) system is one in which each processor runs an identical copy of the operating system on each processor. In an asymmetric multiproce…ssing, system, each processor is assigned a specific tasks. An example of this would be a master- slave relationship between one processor and “the rest”.

Symmetric means that the design of the image is balanced and both sides are equal. An asymmetric image is when the design does not repeat itself so if you fold it in half the …designs will not meet in the same areas.

Symmetrical balance is when everything is perfectly and evenly balanced out. Asymmetrical balance refers to a design that has dissimilar elements but still appears balanced…, dividing a picture in half won't have the exact same elements however the elements they do have are varied and seem to balance one another out.

in assymetric processor the operating system typically sets aside one or more processors for its exclusive use while in symetric processors are used to get higher levels of pe…rformance, any processor here can run any type of thread, they communicate with each other through shared memory

Answer Multiprocessing is a generic term for the use of two or more central processing units (CPUs) within a single computer system. There are many va…riations on this basic theme, and the definition of multiprocessing can vary with context, mostly as a function of how CPUs are defined. The term multiprocessing is sometimes used to refer to the execution of multiple concurrent software processes in a system as opposed to a single process at any one instant. However, the term multiprogramming is more appropriate to describe this concept, which is implemented mostly in software, whereas multiprocessing is more appropriate to describe the use of multiple hardware CPUs. A system can be both multiprocessing and multiprogramming, only one of the two, or neither of the two. Time-sharing refers to sharing a computing resource among many users by multitasking. Because early mainframes and minicomputers were extremely expensive, it was rarely possible to allow a single user exclusive access to the machine for interactive use. But because computers in interactive use often spend much of their time idly waiting for user input, it was suggested that multiple users could share a machine by using one user's idle time to service other users. Similarly, small slices of time spent waiting for disk, tape, or network input could be granted to other users. Computers capable of providing time-sharing services would often operate in batch mode overnight.

symmetric compression A data compression technique that takes about the same amount of time to compress as it does to decompress. asymmetric compression A data compre…ssion technique that typically takes more time to compress than it does to decompress. Some asymmetric compression methods take longer to decompress, which would be suited for backup files that are constantly being compressed and rarely decompressed.

From another user: Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symme…tric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised. The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric.

When using symmetric algorithms, both parties share the same key for en- and decryption. To provide privacy, this key needs to be kept secret. Once someone else gets to… know the key, it is not safe any more. Symmetric algorithms have the advantage of not consuming too much computing power. Ex:DES, Triple-DES Asymmetric algorithms use pairs of keys. One is used for encryption and the other one for decryption. The decryption key is typically kept secretly, therefore called private key or secret key, while the encryption key is spread to all who might want to send encrypted messages, therefore called public key.

Symmetric Encryption In symmetric encryption, also known as shared key encryption, the sender and recipient of a message share a single general password, pass phrase or …key. In other words, data is encrypted and decrypted using the same key. Symmetric encryption algorithms are simpler, quicker and require fewer computer resources, such as processing power and memory, than asymmetric encryption algorithms. However, they cannot be used unless the sender and recipient have already exchanged encryption keys. Asymmetric Encryption In asymmetric encryption, also known a public/private encryption, two associated keys, known as public and private keys, are used to encrypt and decrypt data. The public key is distributed freely to anybody who might want to send a message, but the private key is kept secret and never distributed. Asymmetric encryption algorithms are more complex and slower .